Results 41-49 of 49 (Search time: 0.006 seconds).
NO | Title, Author(s) (Publication Title, Volume Issue, Page, Issue Date) |
---|---|
Rogue public key registration attack and the importance of proof of possession in the PKI environment Lee, Younho; Park, Yongsu; Kim, Heeyoul; Hong, Seong-Min; Yoon, Hyunsoo, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E89D, no.8, pp.2452 - 2455, 2006-08 | |
Packet Fair Queueing Algorithms for Wireless Networks with Link Level Retransmission Kim, Namgi; Yoon, Hyunsoo, Consumer Communications and Networking Conference, 2004. CCNC 2004. First IEEE, pp.122-127, 2004 | |
Optimal Modulation and Coding Scheme Selection in Cellular Networks with Hybrid-ARQ Error Control Kim, Dongwook; Jung, Bang Chul; Lee, Hanjin; Sung, Dan Keun; Yoon, Hyunsoo, IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, v.7, no.12, pp.5195 - 5201, 2008-12 | |
A new binary image authentication scheme with small distortion and low false negative rates Lee, Y; Hur, J; Kim, H; Park, Y; Yoon, Hyunsoo, IEICE TRANSACTIONS ON COMMUNICATIONS, v.E90B, pp.3259 - 3262, 2007-11 | |
Adaptive hysteresis using mobility correlation for fast handover Lee, Hanjin; Kim, Dongwook; Chung, Byungehun; Yoon, Hyunsoo, IEEE COMMUNICATIONS LETTERS, v.12, pp.152 - 154, 2008-02 | |
A Resilient and Efficient Replication Attack Detection Scheme for Wireless Sensor Networks Kim, Chano; Shin, Seungjae; Park, Chanil; Yoon, Hyunsoo, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E92D, no.7, pp.1479 - 1483, 2009-07 | |
A proximity-based self-organizing hierarchical overlay framework for distributed hash tables Shin, K; Lee, S; Lim, G; Yoon, Hyunsoo, IEICE TRANSACTIONS ON COMMUNICATIONS, v.E90B, pp.1651 - 1662, 2007-07 | |
Improved base-phi expansion method for Koblitz curves over optimal extension fields Chung, B; Kim, H; Yoon, Hyunsoo, IET INFORMATION SECURITY, v.1, pp.19 - 26, 2007-03 | |
(Undefined) |